Exam 3: Basic Cryptography
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
What is Elliptic curve cryptography?
Free
(Essay)
4.9/5
(32)
Correct Answer:
Elliptic curve cryptography (ECC)was first proposed in the mid-1980s.Instead of using large prime numbers as with RSA,elliptic curve cryptography uses sloping curves.An elliptic curve is a function drawn on an X-Y axis as a gently curved line.By adding the values of two points on the curve,a third point on the curve can be derived,of which the inverse is used.
What is the U.S.federal government standard for digital signatures?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
D
One of the first popular symmetric cryptography algorithms was RSA.
Free
(True/False)
4.7/5
(37)
Correct Answer:
False
In information technology,non-repudiation is the process of proving that a user performed an action.
(True/False)
4.8/5
(33)
In which type of encryption is the same key used to encrypt and decrypt data?
(Multiple Choice)
4.7/5
(38)
What technology uses a chip on the motherboard of the computer to provide cryptographic services?
(Multiple Choice)
4.7/5
(35)
What widely used commercial asymmetric cryptography software can be used for encrypting files and email messages?
(Multiple Choice)
4.8/5
(35)
In cryptography,which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
(Multiple Choice)
4.7/5
(35)
What characteristics are needed to consider a hashing algorithm secure?
(Essay)
4.8/5
(31)
A collision attack is an attempt to find two input strings of a hash function that produce the same hash result.
(True/False)
4.7/5
(36)
Which type of cryptographic algorithm takes an input string of any length,and returns a string of any requested variable length?
(Multiple Choice)
4.9/5
(28)
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
(Multiple Choice)
4.9/5
(33)
Which hash algorithm's primary design feature is two different and independent parallel chains of computation,the results of which are then combined at the end of the process?
(Multiple Choice)
4.9/5
(40)
The simplest type of stream cipher,one in which one letter or character is exchanged for another,is known as what?
(Multiple Choice)
4.8/5
(28)
What term best describes when cryptography is applied to entire disks instead of individual files or groups of files?
(Multiple Choice)
4.8/5
(40)
What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
(Multiple Choice)
4.9/5
(36)
Which standard was approved by NIST in late 2000 as a replacement for DES?
(Multiple Choice)
4.9/5
(35)
Encryption is the practice of transforming information so that it is secure and cannot be accessed by unauthorized parties.
(True/False)
4.9/5
(37)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)